Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32301: CWE-918: Server-Side Request Forgery (SSRF) in centrifugal centrifugo

0
Critical
VulnerabilityCVE-2026-32301cvecve-2026-32301cwe-918
Published: Thu Mar 12 2026 (03/12/2026, 21:19:03 UTC)
Source: CVE Database V5
Vendor/Project: centrifugal
Product: centrifugo

Description

CVE-2026-32301 is a critical Server-Side Request Forgery (SSRF) vulnerability in Centrifugo versions prior to 6. 7. 0. It arises when Centrifugo is configured with a dynamic JWKS endpoint URL that uses template variables such as {{tenant}}. An unauthenticated attacker can craft a malicious JWT with manipulated iss or aud claims, which are interpolated into the JWKS fetch URL before signature verification. This causes Centrifugo to make outbound HTTP requests to attacker-controlled destinations, potentially exposing internal network resources or enabling further attacks. The vulnerability has a CVSS score of 9. 3, indicating high severity with critical impact on confidentiality. No known exploits are currently reported in the wild. The issue is fixed in version 6.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 02:40:55 UTC

Technical Analysis

CVE-2026-32301 is a critical SSRF vulnerability affecting Centrifugo, an open-source real-time messaging server, in versions before 6.7.0. The flaw exists when Centrifugo is configured to fetch JSON Web Key Sets (JWKS) from a URL that includes template variables (e.g., {{tenant}}), which are dynamically replaced based on JWT claims such as iss (issuer) or aud (audience). An attacker can craft a JWT with maliciously controlled iss or aud values that get interpolated into the JWKS URL before the JWT signature is verified. Because signature verification depends on fetching keys from the JWKS endpoint, this interpolation causes Centrifugo to make an outbound HTTP request to an attacker-controlled server. This SSRF can be exploited without authentication or user interaction, allowing attackers to scan internal networks, access internal services, or exfiltrate data indirectly. The vulnerability impacts confidentiality severely, as it can expose internal resources or sensitive data. The integrity impact is limited to partial manipulation of request destinations, and availability is not directly affected. The vulnerability is fixed in Centrifugo 6.7.0 by removing unsafe interpolation of JWT claims into JWKS URLs. No public exploits have been reported yet, but the high CVSS score (9.3) reflects the ease of exploitation and critical impact. The vulnerability is tracked under CWE-918 (SSRF).

Potential Impact

The primary impact of this vulnerability is the potential exposure of internal network resources and sensitive information due to SSRF. Attackers can leverage this to access internal services that are otherwise inaccessible externally, potentially leading to data leakage, reconnaissance, or pivoting attacks within an organization's infrastructure. Confidentiality is highly impacted as attackers can induce Centrifugo to make requests to arbitrary internal or external endpoints. Integrity impact is low since the attacker cannot directly modify data but can influence request destinations. Availability is not significantly affected. Organizations running vulnerable Centrifugo versions with dynamic JWKS URLs are at risk of unauthorized internal network scanning and data exposure. This can be particularly damaging in environments where Centrifugo is deployed in sensitive or segmented networks. The lack of required authentication and user interaction makes exploitation straightforward for remote attackers. The widespread use of Centrifugo in real-time messaging scenarios means that many organizations could be affected, especially those using multi-tenant or dynamic JWKS configurations.

Mitigation Recommendations

1. Upgrade Centrifugo to version 6.7.0 or later, where this SSRF vulnerability is fixed. 2. Avoid using dynamic template variables in JWKS endpoint URLs, especially those interpolated from untrusted JWT claims such as iss or aud. 3. If dynamic JWKS URLs are necessary, implement strict validation and sanitization of JWT claims before interpolation to prevent injection of malicious values. 4. Restrict outbound HTTP requests from Centrifugo servers via network-level controls such as firewall rules or egress filtering to limit access to only trusted JWKS endpoints. 5. Monitor logs for unusual outbound HTTP requests from Centrifugo instances, which may indicate exploitation attempts. 6. Employ network segmentation to isolate Centrifugo servers from sensitive internal resources to reduce SSRF impact. 7. Conduct regular security assessments and penetration testing focusing on SSRF vectors in your environment. 8. Educate developers and administrators about the risks of dynamic URL interpolation and secure JWT validation practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-11T21:16:21.658Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b333cf2f860ef943fdd74a

Added to database: 3/12/2026, 9:44:47 PM

Last enriched: 3/20/2026, 2:40:55 AM

Last updated: 4/27/2026, 1:21:08 AM

Views: 108

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses